Exploring Security Countermeasures along the Attack Sequence | IEEE Conference Publication | IEEE Xplore